Leann,

A fresh set of Power9 patches for the kernel.

                  Michael


On 03/09/2017 11:29 AM, Launchpad Bug Tracker wrote:
> bugproxy (bugproxy) has assigned this bug to you for Ubuntu:
>
> Dear Canonical,
>
> Currently Ubuntu is having some issues on a POWER9 machine, as:
>
>
>      [  443.933079] ------------[ cut here ]------------
>      [  443.933102] WARNING: CPU: 10 PID: 10243 at 
> /build/linux-iMfvOW/linux-4.10.0/arch/powerpc/mm/fault.c:428 
> do_page_fault+0x5d8/0x7d0
>      [  443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart 
> ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler 
> ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs 
> iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables 
> autofs4 ses enclosure scsi_transport_sas btrfs raid10 raid456 
> async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
> libcrc32c raid1 raid0 multipath linear ast i2c_algo_bit ttm drm_kms_helper 
> syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid
>      [  443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted 
> 4.10.0-9-generic #11-Ubuntu
>      [  443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000
>      [  443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: 
> 0000000000000003
>      [  443.933217] REGS: c0000007adc63b00 TRAP: 0700   Not tainted  
> (4.10.0-9-generic)
>      [  443.933219] MSR: 9000000000029033 <SF,HV,EE,ME,IR,DR,RI,LE>
>      [  443.933237]   CR: 48248422  XER: 00000000
>      [  443.933240] CFAR: c00000000005163c SOFTE: 1
>                     GPR00: c0000000000515b4 c0000007adc63d80 c00000000142c400 
> c0000007ad0a3b60
>                     GPR04: 00003fff7b7bc92c 0000000000000000 00000007fc020000 
> 0000000000000000
>                     GPR08: 0000000000000003 0000000000000001 c0000000012ec400 
> 0000000000000000
>                     GPR12: 0000000000004000 c00000000fb85a00 0000000000000001 
> 00003fff7d640ea8
>                     GPR16: 00003fffdc1b6e78 00003fffdc1b6e70 00003fffdc1b6e68 
> 00003fffdc1b6e58
>                     GPR20: 00003fff7d640e00 ffffffffffffffc0 0000000000030001 
> 0000000000000000
>                     GPR24: 0000000000000054 c0000007b21e0b68 c0000007ad0a3b60 
> c0000007b21e0b00
>                     GPR28: 00003fff7b7bc92c 0000000008000000 0000000000000000 
> c0000007adc63ea0
>      [  443.933307] NIP [c0000000000519d8] do_page_fault+0x5d8/0x7d0
>      [  443.933312] LR [c0000000000515b4] do_page_fault+0x1b4/0x7d0
>      [  443.933314] Call Trace:
>      [  443.933320] [c0000007adc63d80] [c0000000000515b4] 
> do_page_fault+0x1b4/0x7d0 (unreliable)
>      [  443.933328] [c0000007adc63e30] [c00000000000a4e8] 
> handle_page_fault+0x10/0x30
>      [  443.933332] Instruction dump:
>      [  443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 
> 3d42ffec 892ab491
>      [  443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 
> 7f86e378 7ec5b378
>      [  443.933366] ---[ end trace 4798790ae3dab875 ]---
>
>
> ======
>
>
> We would like to include the following patches to fix it:
>
> * cee216a696b2004017a5ecb583366093d90b1568 mm/autonuma: don't use
> set_pte_at when updating protnone ptes
>
> * 288bc54949fc2625a4fd811a188fb200cc498946 mm/autonuma: let architecture
> override how the write bit should be stashed in a protnone pte.
>
> * 595cd8f256d24face93b2722927ec9c980419c26 mm/ksm: handle protnone saved
> writes when making page write protect
>
> * c137a2757b88658ce61c74b25ff650ecda7f09d8 switch ppc64 to its own
> implementation of saved write
>
> * db08f2030a173fdb95b2e8e28d82c4e8c04df2ac mm/gup: check for protnone
> only if it is a PTE entry
>
> * 9a8b300f2f7812ebf4630b8b40499da38b38e882 mm/thp/autonuma: use TNF flag
> instead of vm fault
>
>
>   * power/mm: update pte_write and pte_wrprotect to handle savedwrite: 
> http://ozlabs.org/~akpm/mmots/broken-out/power-mm-update-pte_write-and-pte_wrprotect-to-handle-savedwrite.patch
>
> * powerpc/mm: Handle protnone ptes on fork:
> http://ozlabs.org/~akpm/mmots/broken-out/powerpc-mm-handle-protnone-
> ptes-on-fork.patch
>
>
> Thanks
>
> ** Affects: ubuntu
>       Importance: Undecided
>       Assignee: Taco Screen team (taco-screen-team)
>           Status: New
>
>
> ** Tags: architecture-ppc64le bugnameltc-152432 severity-high 
> targetmilestone-inin1604

-- 
Michael Hohnbaum
OIL Program Manager
Power (ppc64el) Development Project Manager
Canonical, Ltd.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1671613

Title:
  POWER9: Additional power9 patches

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  In Progress

Bug description:
  Dear Canonical,

  Currently Ubuntu is having some issues on a POWER9 machine, as:

  
      [  443.933079] ------------[ cut here ]------------
      [  443.933102] WARNING: CPU: 10 PID: 10243 at 
/build/linux-iMfvOW/linux-4.10.0/arch/powerpc/mm/fault.c:428 
do_page_fault+0x5d8/0x7d0
      [  443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart 
ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler 
ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs iscsi_tcp 
libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 ses 
enclosure scsi_transport_sas btrfs raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 
multipath linear ast i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect 
sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid
      [  443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted 
4.10.0-9-generic #11-Ubuntu
      [  443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000
      [  443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: 
0000000000000003
      [  443.933217] REGS: c0000007adc63b00 TRAP: 0700   Not tainted  
(4.10.0-9-generic)
      [  443.933219] MSR: 9000000000029033 <SF,HV,EE,ME,IR,DR,RI,LE>
      [  443.933237]   CR: 48248422  XER: 00000000
      [  443.933240] CFAR: c00000000005163c SOFTE: 1
                     GPR00: c0000000000515b4 c0000007adc63d80 c00000000142c400 
c0000007ad0a3b60
                     GPR04: 00003fff7b7bc92c 0000000000000000 00000007fc020000 
0000000000000000
                     GPR08: 0000000000000003 0000000000000001 c0000000012ec400 
0000000000000000
                     GPR12: 0000000000004000 c00000000fb85a00 0000000000000001 
00003fff7d640ea8
                     GPR16: 00003fffdc1b6e78 00003fffdc1b6e70 00003fffdc1b6e68 
00003fffdc1b6e58
                     GPR20: 00003fff7d640e00 ffffffffffffffc0 0000000000030001 
0000000000000000
                     GPR24: 0000000000000054 c0000007b21e0b68 c0000007ad0a3b60 
c0000007b21e0b00
                     GPR28: 00003fff7b7bc92c 0000000008000000 0000000000000000 
c0000007adc63ea0
      [  443.933307] NIP [c0000000000519d8] do_page_fault+0x5d8/0x7d0
      [  443.933312] LR [c0000000000515b4] do_page_fault+0x1b4/0x7d0
      [  443.933314] Call Trace:
      [  443.933320] [c0000007adc63d80] [c0000000000515b4] 
do_page_fault+0x1b4/0x7d0 (unreliable)
      [  443.933328] [c0000007adc63e30] [c00000000000a4e8] 
handle_page_fault+0x10/0x30
      [  443.933332] Instruction dump:
      [  443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 
3d42ffec 892ab491
      [  443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 
7f86e378 7ec5b378
      [  443.933366] ---[ end trace 4798790ae3dab875 ]--- 

  
  ======

  
  We would like to include the following patches to fix it:

  * cee216a696b2004017a5ecb583366093d90b1568 mm/autonuma: don't use
  set_pte_at when updating protnone ptes

  * 288bc54949fc2625a4fd811a188fb200cc498946 mm/autonuma: let
  architecture override how the write bit should be stashed in a
  protnone pte.

  * 595cd8f256d24face93b2722927ec9c980419c26 mm/ksm: handle protnone
  saved writes when making page write protect

  * c137a2757b88658ce61c74b25ff650ecda7f09d8 switch ppc64 to its own
  implementation of saved write

  * db08f2030a173fdb95b2e8e28d82c4e8c04df2ac mm/gup: check for protnone
  only if it is a PTE entry

  * 9a8b300f2f7812ebf4630b8b40499da38b38e882 mm/thp/autonuma: use TNF
  flag instead of vm fault

  
   * power/mm: update pte_write and pte_wrprotect to handle savedwrite: 
http://ozlabs.org/~akpm/mmots/broken-out/power-mm-update-pte_write-and-pte_wrprotect-to-handle-savedwrite.patch

  * powerpc/mm: Handle protnone ptes on fork:
  http://ozlabs.org/~akpm/mmots/broken-out/powerpc-mm-handle-protnone-
  ptes-on-fork.patch

  
  Thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1671613/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to